Multiple vulnerabilities in OpenGnsys

Posted date 12/04/2024
Importance
5 - Critical
Affected Resources
  • OpenGnsys, 1.1.1d (Espeto) version.
Description

INCIBE has coordinated the publication of 4 vulnerabilities: 1 of critical severity, 1 of high severity, and two of medium severity, affecting OpenGnsys version 1.1.1d, a set of free and open tools that constitute a system for the management and cloning of computers, which have been discovered by Pedro Gabaldón Julá, Javier Medina Munuera and Antonio José Gálvez Sánchez.

These vulnerabilities have been assigned the following codes, CVSS v3.1 base score, CVSS vector and CWE vulnerability type for each vulnerability:

  • CVE-2024-3704: 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | CWE-89
  • CVE-2024-3705: 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | CWE-434
  • CVE-2024-3706: 5.9 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N | CWE-200
  • CVE-2024-3707: 5.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N | CWE-548
Solution

There is no reported solution at this time.

Detail

CVE-2024-3704: SQL Injection Vulnerability has been found on OpenGnsys product affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to inject malicious SQL code into login page to bypass it or even retrieve all the information stored in the database.

CVE-2024-3705: unrestricted file upload vulnerability in OpenGnsys affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to send a POST request to the endpoint '/opengnsys/images/M_Icons.php' modifying the file extension, due to lack of file extension verification, resulting in a webshell injection.

CVE-2024-3706: information exposure vulnerability in OpenGnsys affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to view a php backup file (controlaccess.php-LAST) where database credentials are stored.

CVE-2024-3707: information exposure vulnerability in OpenGnsys affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to enumerate all files in the web tree by accessing a php file.

References list